freeciv 2.2 before 2.2.1 and 2.3 before 2.3.0 allows attackers to read arbitrary files or execute arbitrary commands via a scenario that contains Lua functionality, related to the (1) os, (2) io, (3) package, (4) dofile, (5) loadfile, (6) loadlib, (7) module, and (8) require modules or functions.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.4.2-1", "binary_name": "freeciv-client-extras" }, { "binary_version": "2.4.2-1", "binary_name": "freeciv-client-gtk" }, { "binary_version": "2.4.2-1", "binary_name": "freeciv-client-sdl" }, { "binary_version": "2.4.2-1", "binary_name": "freeciv-client-xaw3d" }, { "binary_version": "2.4.2-1", "binary_name": "freeciv-data" }, { "binary_version": "2.4.2-1", "binary_name": "freeciv-server" }, { "binary_version": "2.4.2-1", "binary_name": "freeciv-sound-standard" } ] }